Categories
Jargon Buster

Jargon Buster What is CAPTCHA

Courtney explains CAPTCHA Everyone is familiar with the CAPTCHA function on websites – but what is it for? JUMPSEC’s Courtney Cole explains in our latest episode of Jargon Busters – helping you navigate Cyber Security Jargon. Video Transcript: “Everyone knows and has seen CAPTCHAs, but what are they really for? CAPTCHAs are implemented in websites […]

Categories
Jargon Buster

Jargon Buster – What is Credential Stuffing?

Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential stuffing is. Video transcript: When professionals mention credential stuffing attacks, what they are usually referring to is the process of brute-forcing username-password pairs into applications in order to get a valid login. For an attacker, this process can be automated […]

Categories
Jargon Buster

Jargon Buster What is a Zero Trust Network

Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom explains what is meant by the term “Zero Trust Network” in this edition of JUMPSEC’s Jargon Buster Series – helping you navigate Cyber Security Terminology. “On typical networks, all users who are able to access the network – either by […]

Categories
Jargon Buster

Jargon Buster What is File Inclusion Vulnerability

Thom explains File Inclusion Vulnerability Learn more about this type of vulnerability in the latest edition of JUMPSEC’s Jargon Buster series. Cyber security expert Thom explains what is meant by the term “File Inclusion Vulnerability”. “A file inclusion vulnerability occurs when a web page contains references to a file and allows the reference to point […]

Categories
Jargon Buster

Jargon Buster What is Red Teaming vs Penetration Tests

Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing share some similarities – learn the difference in the latest edition of JUMPSEC’s Jargon Buster series – helping you to navigate Cyber Security terminology. “There are a number of ways that a red teaming exercise differentiates from a pen test. […]

Categories
Incident Response Jargon Buster

Jargon Buster What is a Disaster Recovery Plan

Nikoo discusses why is a Disaster Recovery Plan is important In this week’s episode of JUMPSEC’s Jargon Buster series, cyber security expert Nikoo sheds light on Disaster Recovery Plans and why they are so imprtant. “Business Continuity Plans and Disaster Recovery plans are two key elements of the ISO27000 series of standards. Disaster recovery plans […]

Categories
Jargon Buster Vulnerability

Jargon Buster External & Internal Managed Vulnerability Scanning

Courtney talks about the difference between External & Internal Managed Vulnerability Scanning There is more than one kind of Managed Vulnerability Scanning. In this week’s edition of JUMPSEC’s cyber security Jargon Buster series, Courtney explains the difference between External and Internal Managed Vulnerability Scanning. “External Managed Vulnerability Scanning only targets infrastructure on the public Internet […]

Categories
Jargon Buster Uncategorized

Jargon Buster Vulnerability Assessments vs Penetration Tests

Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security expert Thom sheds some light on Vulnerability Assessments, Penetrations Tests and the differences between them. “Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a […]

Categories
Jargon Buster Uncategorized

Jargon Buster External & Internal Managed Vulnerability Scanning

Courtney explains the difference between External & Internal Managed Vulnerability Scanning “External Managed Vulnerability Scanning only targets infrastructure on the public internet perimeter, such as web applications and VPN services. by contract Internal Managed Vulnerability Scanning focuses only on your internal infrastructure, such as a user workstations, files servers and so on. External and Internal […]

Categories
Jargon Buster

Jargon Buster Vulnerability Scans vs Managed Vulnerability Scanning

Courtney explains Vulnerability Scans & why Managed Vulnerability Scanning is different JUMPSEC’s Courtney Cole explains the difference between a Vulnerability Scan and Managed Vulnerability Scanning in this episode of our Jargon Buster series – helping you to navigate Cyber Security Terminology. “A vulnerability scan is performed by a vulnerability scanning tool to provide a list […]